The famous Square attacks against the Rijndael algorithm have taken advantage of the change of the balance of some bytes. Further study shows that the change of activity always happens before the change of balance, wh...The famous Square attacks against the Rijndael algorithm have taken advantage of the change of the balance of some bytes. Further study shows that the change of activity always happens before the change of balance, which builds the foundation for a new activity attack presented in this paper. In the activity attack, the round in which the activity changes is executed in an equivalent form to avoid the obstructive restriction of the subkeys of that round.The existence of the birthday paradox guarantees much fewer plaintexts necessary for activity attacks comparing with that for corresponding Square attacks. But no benefit may result from the new attacks performed independently because the activity attacks guess four instead of one key byte once. Only when both the balance property and the activity property are exploited at the same time can much better performance be obtained. The better performance in the simulation shows that the consuming time and chosen plaintexts necessary are both reduced to one tenth of those of the corresponding Square attacks. So the activity attacks could be viewed as an efficient supplement to the Square attacks.展开更多
A novel fast despreading scheme for M-ary Multi-Carrier Code-Division Multiple Access (MC-CDMA) system is proposed based on cyclic spreading codes and pre-equalizer. In the transmitter, the M spreading codes of each u...A novel fast despreading scheme for M-ary Multi-Carrier Code-Division Multiple Access (MC-CDMA) system is proposed based on cyclic spreading codes and pre-equalizer. In the transmitter, the M spreading codes of each user are generated by circularly shifting the prototype spreading code. A feedback pre-equalizer is employed to process the M-ary MC- CDMA signal before transmitted. The received signal is multiplied by the Inverse Discrete Fourier Transform (IDFT) result of the mirror image code of the prototype spreading code, and then demodulated by Orthogonal Frequency-Division Multiplexing (OFDM) demodulator. Compared with the conventional M-ary MC-CDMA receiver, the proposed scheme increases bandwidth efficiency, meanwhile, it achieves M-ary despread spectrum and multi-carrier demodulation, which reduces computation complexity remarkably.展开更多
In cellular network, several Time Difference Of Arrival (TDOA) location algorithms can be applied to mobile position estimation. However, each algorithm has its own limitations and none of them is proved to be the mos...In cellular network, several Time Difference Of Arrival (TDOA) location algorithms can be applied to mobile position estimation. However, each algorithm has its own limitations and none of them is proved to be the most reliable one in different channel environments. In this paper Kleine-Ostmann's data fusion model is modified and a collaborative location model which incorporates position estimate of two TDOA location algorithms is proposed.Analysis and simulation show that more reliable and accurate mobile position estimation can be achieved based on this model.展开更多
The Frequency-Coded Pulse (FCP) signal has good performance of range and Doppler resolution. This paper first gives the mathematical expression of the ambiguity function for FCP signals, and then presents a coding rul...The Frequency-Coded Pulse (FCP) signal has good performance of range and Doppler resolution. This paper first gives the mathematical expression of the ambiguity function for FCP signals, and then presents a coding rule for optimizing FCP signal. The genetic algorithm is presented to solve this kind of problem for optimizing codes. Finally, an example for optimizing calculation is illustrated and the optimized frequency coding results are given with the code length N=64 and N=128 respectively.展开更多
A p-type AlAs(70.2 nm)/16.5 period [GaAs(3 nm)/AlAs(0.7 nm)] semiconductor/superlatice distributed Bragg reflector (DBR) has been grown on n +-GaAs(100) substrate by V80H molecular beam epitaxy system. Experimental re...A p-type AlAs(70.2 nm)/16.5 period [GaAs(3 nm)/AlAs(0.7 nm)] semiconductor/superlatice distributed Bragg reflector (DBR) has been grown on n +-GaAs(100) substrate by V80H molecular beam epitaxy system. Experimental reflection spectrum shows that its central wavelength is 820 nm, with the peak reflectivity for 10-pair DBR of as high as 96 %, and the reflection bandwidth of as wide as 90 nm. We formed a 20×20 μm 2 square mesa to measure the series resistance using wet chemical etching. From the measurement result, the series resistance of about 50 Ω is obtained at a moderate doping (3×10 18 cm -3 ). Finally, the dependence of the resistance of the DBR on the temperature is analyzed. From the experimental result, it is found that the mechanism of the low series resistance of this kind of DBR may increase the tunneling current in the semiconductor/superlattice mirror structure, which will result in a decrease in series resistance.展开更多
A hybrid approach for fuzzy system design based on clustering and a kind of neurofuzzy networks is proposed. An unsupervised clustering technique is firstly used to determine the number of if-then fuzzy rules and gene...A hybrid approach for fuzzy system design based on clustering and a kind of neurofuzzy networks is proposed. An unsupervised clustering technique is firstly used to determine the number of if-then fuzzy rules and generate an initial fuzzy rule base from the given input-output data. Then, a class of neurofuzzy networks is constructed and its weights are tuned so that the obtained fuzzy rule base has a high accuracy. Finally, two examples of function approximation problems are given to illustrate the effectiveness of the proposed approach.展开更多
The autocorrelation of a Boolean function possesses the capability to reflect such characteristics as linear structure, Strict Avalanche Criterion(SAC) and Propagation Criterion(PC)of degree k. But it can do nothing i...The autocorrelation of a Boolean function possesses the capability to reflect such characteristics as linear structure, Strict Avalanche Criterion(SAC) and Propagation Criterion(PC)of degree k. But it can do nothing in determining the order of SAC or PC. A calculating table for the autocorrelation is constructed in this paper so as to show what is beyond the autocorrelation and how the three cryptographic characteristics are exhibited. A deeper study on the calculating table in a similar way has helped us to develop a new concept, named as the general autocorrelation, to address efficiently the problem how to determine the orders of SAC and PC. The application on the Advanced Encryption Standard(AES) shows the SAC and PC characteristics of Boolean functions of AES S-box.展开更多
Multiple access interference (MAI) and near-far problem are two major obstacles in DS-CDMA systems. Combining wavelet neural networks and two matched filters, the novel multiuser detector, which is based on multiple v...Multiple access interference (MAI) and near-far problem are two major obstacles in DS-CDMA systems. Combining wavelet neural networks and two matched filters, the novel multiuser detector, which is based on multiple variable function estimation wavelet networks over single path asynchronous channel and space-time channel respectively is presented. Excellent localization characteristics of wavelet functions in both time and frequency domains allowed hierarchical multiple resolution learning of input-output data mapping. The ma thematic frame of the neural networks and error back ward propagation algorithm are introduced. The complexity of the multiuser detector only depends on that of wavelet networks. With numerical simulations and performance analysis, it indicates that the multiuser detector has excellent performance in eliminating MAI and near-far resistance.展开更多
The interaction between PII and NifA in A. brasilense Sp7 was investigated by using the yeast two-hybrid system. Our experimental results showed that PII directly interacted with the entire NifA protein and its N-term...The interaction between PII and NifA in A. brasilense Sp7 was investigated by using the yeast two-hybrid system. Our experimental results showed that PII directly interacted with the entire NifA protein and its N-terminal domain,but did not interact with the central domain and the C-terminal domain of NifA. No interaction happened if glnB coding for PII was frame-shift mutated. Pz, a homolog of PII, had no interation with NifA.展开更多
Distributed Coordination Function (DCF) is the basis of the IEEE 802.11 WLANMAC protocols. This paper proposes a scheme named DCF+, which can be regarded as an optionto DCF, to enhance the performance of reliable tran...Distributed Coordination Function (DCF) is the basis of the IEEE 802.11 WLANMAC protocols. This paper proposes a scheme named DCF+, which can be regarded as an optionto DCF, to enhance the performance of reliable transport protocol over WLAN. To analyze theperformance of DCF and DCF+, this paper also introduces an analytical model to compute thesaturated throughput performance of WLAN. Compared with other models, this model is moreaccurate, which is verified by elaborate simulations. Moreover, DCF+ is shown to be able toimprove the performance of TCP over WLAN by both modeling and simulations.展开更多
基金the National 973 Project(G1999035803)National 863 Grand Project(2002AA143021)and the National Cryptography Development Funds for the Tenth Five-year Project
文摘The famous Square attacks against the Rijndael algorithm have taken advantage of the change of the balance of some bytes. Further study shows that the change of activity always happens before the change of balance, which builds the foundation for a new activity attack presented in this paper. In the activity attack, the round in which the activity changes is executed in an equivalent form to avoid the obstructive restriction of the subkeys of that round.The existence of the birthday paradox guarantees much fewer plaintexts necessary for activity attacks comparing with that for corresponding Square attacks. But no benefit may result from the new attacks performed independently because the activity attacks guess four instead of one key byte once. Only when both the balance property and the activity property are exploited at the same time can much better performance be obtained. The better performance in the simulation shows that the consuming time and chosen plaintexts necessary are both reduced to one tenth of those of the corresponding Square attacks. So the activity attacks could be viewed as an efficient supplement to the Square attacks.
基金Supported by the National Natural Science Foundation of China (No.60172029).
文摘A novel fast despreading scheme for M-ary Multi-Carrier Code-Division Multiple Access (MC-CDMA) system is proposed based on cyclic spreading codes and pre-equalizer. In the transmitter, the M spreading codes of each user are generated by circularly shifting the prototype spreading code. A feedback pre-equalizer is employed to process the M-ary MC- CDMA signal before transmitted. The received signal is multiplied by the Inverse Discrete Fourier Transform (IDFT) result of the mirror image code of the prototype spreading code, and then demodulated by Orthogonal Frequency-Division Multiplexing (OFDM) demodulator. Compared with the conventional M-ary MC-CDMA receiver, the proposed scheme increases bandwidth efficiency, meanwhile, it achieves M-ary despread spectrum and multi-carrier demodulation, which reduces computation complexity remarkably.
基金Supported by the National Natural Science Foundation of China(NNSF/RGC)(No.60218001)the National Key Lab, IETTC
文摘In cellular network, several Time Difference Of Arrival (TDOA) location algorithms can be applied to mobile position estimation. However, each algorithm has its own limitations and none of them is proved to be the most reliable one in different channel environments. In this paper Kleine-Ostmann's data fusion model is modified and a collaborative location model which incorporates position estimate of two TDOA location algorithms is proposed.Analysis and simulation show that more reliable and accurate mobile position estimation can be achieved based on this model.
文摘The Frequency-Coded Pulse (FCP) signal has good performance of range and Doppler resolution. This paper first gives the mathematical expression of the ambiguity function for FCP signals, and then presents a coding rule for optimizing FCP signal. The genetic algorithm is presented to solve this kind of problem for optimizing codes. Finally, an example for optimizing calculation is illustrated and the optimized frequency coding results are given with the code length N=64 and N=128 respectively.
文摘A p-type AlAs(70.2 nm)/16.5 period [GaAs(3 nm)/AlAs(0.7 nm)] semiconductor/superlatice distributed Bragg reflector (DBR) has been grown on n +-GaAs(100) substrate by V80H molecular beam epitaxy system. Experimental reflection spectrum shows that its central wavelength is 820 nm, with the peak reflectivity for 10-pair DBR of as high as 96 %, and the reflection bandwidth of as wide as 90 nm. We formed a 20×20 μm 2 square mesa to measure the series resistance using wet chemical etching. From the measurement result, the series resistance of about 50 Ω is obtained at a moderate doping (3×10 18 cm -3 ). Finally, the dependence of the resistance of the DBR on the temperature is analyzed. From the experimental result, it is found that the mechanism of the low series resistance of this kind of DBR may increase the tunneling current in the semiconductor/superlattice mirror structure, which will result in a decrease in series resistance.
基金This project was supported by the National Natural Science Foundation of China (60141002).
文摘A hybrid approach for fuzzy system design based on clustering and a kind of neurofuzzy networks is proposed. An unsupervised clustering technique is firstly used to determine the number of if-then fuzzy rules and generate an initial fuzzy rule base from the given input-output data. Then, a class of neurofuzzy networks is constructed and its weights are tuned so that the obtained fuzzy rule base has a high accuracy. Finally, two examples of function approximation problems are given to illustrate the effectiveness of the proposed approach.
基金Partially supported by the National 973 Project(G1999035803)National 863 Project (2002AA143021)the National Cryptography Development Funds for the Tenth Fiveyear Project
文摘The autocorrelation of a Boolean function possesses the capability to reflect such characteristics as linear structure, Strict Avalanche Criterion(SAC) and Propagation Criterion(PC)of degree k. But it can do nothing in determining the order of SAC or PC. A calculating table for the autocorrelation is constructed in this paper so as to show what is beyond the autocorrelation and how the three cryptographic characteristics are exhibited. A deeper study on the calculating table in a similar way has helped us to develop a new concept, named as the general autocorrelation, to address efficiently the problem how to determine the orders of SAC and PC. The application on the Advanced Encryption Standard(AES) shows the SAC and PC characteristics of Boolean functions of AES S-box.
基金This project was supported by the National Natural Science Foundation of China (60073053 60133010).
文摘Multiple access interference (MAI) and near-far problem are two major obstacles in DS-CDMA systems. Combining wavelet neural networks and two matched filters, the novel multiuser detector, which is based on multiple variable function estimation wavelet networks over single path asynchronous channel and space-time channel respectively is presented. Excellent localization characteristics of wavelet functions in both time and frequency domains allowed hierarchical multiple resolution learning of input-output data mapping. The ma thematic frame of the neural networks and error back ward propagation algorithm are introduced. The complexity of the multiuser detector only depends on that of wavelet networks. With numerical simulations and performance analysis, it indicates that the multiuser detector has excellent performance in eliminating MAI and near-far resistance.
基金This work was supported by the National 73Project (Grant No. 001CB108904) and the National Natural Science Foundation of China (Grant No.30070407).
文摘The interaction between PII and NifA in A. brasilense Sp7 was investigated by using the yeast two-hybrid system. Our experimental results showed that PII directly interacted with the entire NifA protein and its N-terminal domain,but did not interact with the central domain and the C-terminal domain of NifA. No interaction happened if glnB coding for PII was frame-shift mutated. Pz, a homolog of PII, had no interation with NifA.
文摘Distributed Coordination Function (DCF) is the basis of the IEEE 802.11 WLANMAC protocols. This paper proposes a scheme named DCF+, which can be regarded as an optionto DCF, to enhance the performance of reliable transport protocol over WLAN. To analyze theperformance of DCF and DCF+, this paper also introduces an analytical model to compute thesaturated throughput performance of WLAN. Compared with other models, this model is moreaccurate, which is verified by elaborate simulations. Moreover, DCF+ is shown to be able toimprove the performance of TCP over WLAN by both modeling and simulations.